Search Your Query

All Cart

Cart

  • Home
  • Hackers Steal Data & Demand Ransom

Hackers Steal Data & Demand Ransom

images images
  • admin Written by admin
  • January 26, 2026
  • 3 minutes

US-based food delivery platform GrubHub confirmed a data breach where hackers downloaded data from its systems.

GrubHub Data Breach

The ShinyHunters cybercrime group is allegedly behind the attack. The hackers are now demanding Bitcoin payment to prevent releasing the stolen information.

GrubHub is one of at least 31 confirmed victims tied to a larger wave of Salesforce-related data thefts that prompted an FBI warning in September 2025.

How the GrubHub Data Breach Happened

The attackers didn’t hack GrubHub directly. They used stolen credentials from an August 2025 attack on Salesloft, a sales engagement platform that integrates with Salesforce.

Between August 8 and August 18, 2025, threat actors harvested OAuth tokens from Salesloft’s Salesforce integration. They used these tokens to infiltrate companies across multiple industries.

The stolen data reportedly includes:

  • Zendesk customer support records
  • Older Salesforce data from a February 2025 breach
  • Company information from GrubHub’s systems

GrubHub states that financial information and order history were not affected by this incident.

TROYPOINT Tip: Protect your identity and personal info from a data breach by using Aura Identity Theft Protection which is TROYPOINT’s recommended identity theft protection.

Aura Identity Theft Protection Review

GrubHub’s Response

GrubHub says it quickly investigated and stopped the unauthorized activity after discovering the breach. The company hired a third-party cybersecurity firm to assess the damage and has notified law enforcement.

The organization states it is taking steps to strengthen its security posture. GrubHub has not confirmed whether ransom negotiations with ShinyHunters are ongoing.

The ShinyHunters group is also allegedly responsible for data breaches involving Gucci, Gmail, AT&T, and several other organizations.

ShinyHunters on Hacker Forums
ShinyHunters on Hacker Forums

How to Protect Yourself After This Breach

If you have a GrubHub account, take these steps now:

  • Change your GrubHub password immediately. Use a unique password you haven’t used on other accounts.
  • Enable two-factor authentication on your GrubHub account and any other services using the same login credentials.
  • Monitor your email for phishing attempts. Hackers often use stolen data to craft convincing scam messages pretending to be from legitimate companies.
  • Watch your bank and credit card statements for unauthorized charges over the coming weeks.

Final Thoughts

This GrubHub data breach shows how third-party integrations can become weak points in any company’s security. One compromised vendor exposed dozens of organizations in this attack wave.

Stay alert and review your account security settings regularly. Data breaches are becoming more common, and taking basic precautions now can save you serious headaches later.

For more details on this story, refer to the original report from BleepingComputer.

We want to know your thoughts. What do you think about this story? Let us know in the comment section below!

Be sure to stay up-to-date with the latest streaming news, reviews, tips, and more by following the TROYPOINT Advisor with updates weekly.

 

🛑 HURRY – SURFSHARK VPN DISCOUNT

Surfshark VPN Exclusive Discount

Your online activity is monitored by your ISP, app/addon/IPTV devs, government, and all websites.

🔒 Become anonymous while streaming & downloading with Surfshark VPN

Save 87% with 24-Month Plan + Get 3 FREE Months

Use on Unlimited Devices & Share 1 Account with Entire Family

CLAIM DEAL HERE

 

This page includes affiliate links where TROYPOINT may receive a commission at no extra cost to you. Many times, visitors will receive a discount due to the special arrangements made for our fans. Learn more on my Affiliate Disclaimer page.

Images Images